Application Security Engineer Intern Resume
5.00/5 (Submit Your Rating)
Ny, NY
TECHNICAL SKILLS:
Programming Skills: Python, JavaScript, Bash, C
Security Tools: Nmap, Nessus, Metasploit, Ettercap, SSLstrip, Netcat, John the Ripper, Aircrack - ng, Wireshark
Operating system security: UNIX/ Linux(Red Hat, Debian), Windows (XP, 7, Server 2012 R2)
Web security: OWASP top 10
Network security: TCP/IP, IDS/IPS administration, Firewall configuration, Setting up routers and ACL, HTTP/HTTPS, FTP, SSH, SMB, SMTP, SELinux and firewalld filtering techniques
EXPERIENCE:
Confidential, NY, NY
Application Security Engineer Intern
Responsibilities:
- Applied manual hacks and tools such as Burp Proxy to perform black box and white box vulnerability assessments of web applications
- Assessed information security risks associated with networking systems
- Produced written reports detailing findings, risk levels and mitigation recommendations
Confidential
Application Security Engineer InternResponsibilities:
- Encrypt files before storing on a cloud storage server so that the server cannot read the file content but a desired peer can
- Using Crypto++ library we implement AES encryption to ensure confidentiality of data and HMAC to ensure integrity of data. We use RSA scheme to securely transmit private keys to the desired peer.
- Create awareness and illustrate the dangers of storing unencrypted files on the cloud. Provide users with a simple to use one click tool to encrypt/decrypt files and securely send files to their peers
Confidential
Application Security Engineer InternResponsibilities:
- Detect possible DDOS attack and check for presence of malicious IP addresses in PCAP file
- Scan all IP addresses in PCAP against a blacklist file to determine if any of them are malicious
- If a malicious IP address sending traffic over a certain threshold is detected, DDOS attack alert is sent to the user
Confidential
Application Security Engineer InternResponsibilities:
- Successfully gained administrative access to Windows XP SP2 (unpatched) using MS08 067 netapi exploit.
- Detected and eradicated HackerDefender kernel rootkit using anti-virus forensics tool chrootkit.
- Utilized Aircrack-ng suite for wireless traffic capture, analysis and password recovery
- Exploited common web vulnerabilities such as JavaScript injection, SQL injection, XSS, CSRF, broken authentication and session management, clickjacking etc.
- Security tools: OWASP ZAP, Burp Proxy, OpenVAS, Wikto, SQLMap, BeEF